期刊文献+

基于FPGA可重构快速密码芯片设计 被引量:3

Design of Fast Reconfigurable Cipher Chip Based on FPGA
在线阅读 下载PDF
导出
摘要 为提高密码芯片的应用效益,提出了一种基于FPGA可重构的密码芯片实现方法。该方法打破了传统了一类密码芯片采用一种设计方案的模式,通过对FPGA的重构设计,能够动态地实现多种不同计算特征的密码算法芯片。同时对最基础的乘法运算和加法运算,设计了细粒度流水的加速策略。该方案能够重构实现DES、AES、RSA、椭圆曲线密码算法等典型密码算法,对600M的数据文件加密测试,DES的加速比为2.8,AES的加速比为3.6。 In order to enhance the application benefit of the password chip,has proposed one kind of the cipher chip realization method with reconfigurable technical based on FPGA.This method broke the pattern that the traditional kind of cipher chip design with one kind of proposal,through to the FPGA reconfigurable design,could dynamic realize many kinds of different computation characteristic crypto-algorithm chip,enhanced the design flexibility greatly.Meanwhile regarding the most foundation units which inluding the multiply operation and the additive operation,has designed the fine grain pipeline acceleration strategy.The cipher chip designed in this paper can reconfigurable realizes DES,AES,RSA,the elliptic curve crypto-algorithm and so on typical crypto-algorithm,Has taken the test with 600M data file,the DES acceleration ratio is the 2.8,AES acceleration ratio is 3.6.
作者 李可长
出处 《计算机测量与控制》 CSCD 北大核心 2011年第7期1665-1667,共3页 Computer Measurement &Control
基金 广西教育厅科研基金项目(200911LX492)
关键词 可重构 密码芯片 FPGA 细粒度流水 逻辑单元 reconfigurable cipher chip FPGA fine grain pipeline logical unit
  • 相关文献

参考文献13

二级参考文献111

共引文献115

同被引文献38

  • 1赵学秘,王志英,岳虹,陆洪毅,戴葵.TTA-EC:一种基于传输触发体系结构的ECC整体算法处理器[J].计算机学报,2007,30(2):225-233. 被引量:4
  • 2National Institute of Standards and Technology.FIPS 180-1,Secure Hash standard[S].Virginia:FIPS, 1993.
  • 3WANG X,YU H,YIN Y L.Efficient collision search attacks on SHA-0[C] // Proceedings of CRYPTO 2005,LNCS 3621.Berlin:Springer-Verlag,2005:1-16.
  • 4WANG X,YIN Y L,YU H.Finding collisions in the full SHA-1[C] //Proceedings of CRYPTO 2005,LNCS 3621.Berlin:Springer-Verlag,2005:17-36.
  • 5WANG X,YU H.How to break MD5 and other Hash functions[C] // Proceedings of EUROCRYPT 2005,LNCS 3494.Berlin:Springer-Verlahg,2005:19-35.
  • 6BERTONI G,DAEMEN J,PEETERS M,et al.Keccak specifications[EB/OL].[2010-05-20].http://keccak.noekeon.org/Keccak-specifications.pdf.
  • 7BALDWIN B,HANLEY N,HAMILTON M,et al.FPGA implementations of the round two SHA-3 candidates[EB/OL].[2010-05-20].http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/Aug2010/documents/papers/BALDWIN_FPGA_SHA3.pdf.
  • 8MATSUO S,KNEZEVIC M,SCHAUMONT P,et al.How can we conduct "fair and consistent" hard-ware evaluation for SHA3 candidate[EB/OL].[2010-05-20].http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/.
  • 9STR(O)MBERGSON J.Implementation of the Keccak Hash function in F PGA devices[EB/OL].[2010-05-20].http://www.stromb ergson.com/ktyptoblog/2008/12/17/implementation-av-keccak-i-fpgateknologi/.
  • 10HOMSIRIKAMOL E,ROGAWSKI M,GAJ K.Comparing hardware performance of fourteen round two SHA-3 candidates using FPGAs[EB/OL].[2010-05-20].http://eprint.iacr.org/2010/.

引证文献3

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部